Publisher
Springer Nature Switzerland
Reference27 articles.
1. Aksu, M.U., Bicakci, K., Dilek, M.H., Ozbayoglu, A.M., Tatli, E.ı.: Automated generation of attack graphs using NVD. In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, pp. 135–142 (2018)
2. Anwar, A., Abusnaina, A., Chen, S., Li, F., Mohaisen, D.: Cleaning the NVD: comprehensive quality assessment, improvements, and analyses. IEEE Trans. Dependable Secure Comput. 19(6), 4255–4269 (2021)
3. Chen, H., Liu, R., Park, N., Subrahmanian, V.: Using Twitter to predict when vulnerabilities will be exploited. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 3143–3152 (2019)
4. Devlin, J., Chang, M.W., Lee, K., Toutanova, K.: BERT: pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)
5. LNCS;E Doynikova,2022